>Any ideas?

I work offsite from my company's main corporate offices. The office 
where I work does not allow any traffic in or out of their firewall 
without making a formal request to the IT department. I needed to find 
out what ports the Cisco VPN used, so I used Shorewall to help me figure 
it out. Here is what I did:

Just below the "SECTION NEW" in the rules file, I added this rule:
REJECT:info     loc:10.240.5.128        net

10.240.5.128 is the IP address of the system that is trying to connect 
using the Cisco VPN.

I then restarted Shorewall and tried to connect with the Cisco VPN. With 
the above rule added, my log got several instances of the following 
message:
Apr 18 10:07:34 server kern.info kernel: Shorewall:loc2net:REJECT:IN=br0 
OUT=br1 PHYSIN=tap0 PHYSOUT=vlan1 SRC=10.240.5.128 DST=208.37.144.30 
LEN=898 TOS=0x00 PREC=0x00 TTL=127 ID=30661 PROTO=UDP SPT=500 DPT=500 
LEN=878

(You should probably ignore the PHYSIN=tap0 -- I conducted this testing 
over another VPN -- I used OpenVPN to connect from work to my home and 
then tried using the Cisco VPN client to connect to the corporate office 
through my home internet connection. The results would be the same if I 
had been in my home.)

The "PROTO=UDP SPT=500 DPT=500" part of the log prompted me to add the 
following rule above my previous REJECT rule:
ACCEPT:info     loc:10.240.5.128        net     UDP     500

I restarted Shorewall again and gave it another try. This time I 
received the following messages in my log file:
Apr 18 10:11:07 server kern.info kernel: Shorewall:loc2net:REJECT:IN=br0 
OUT=br1 PHYSIN=tap0 PHYSOUT=vlan1 SRC=10.240.5.128 DST=208.37.144.30 
LEN=29 TOS=0x00 PREC=0x00 TTL=127 ID=33539 PROTO=UDP SPT=4500 DPT=4500 
LEN=9

The "PROTO=UDP SPT=4500 DPT=4500" part of the log message indicated that 
I needed to change my accept rule to the following:
ACCEPT:info     loc:10.240.5.128        net     UDP     500,4500

After restarting Shorewall, everything worked. I submitted a request to 
the IT department to allow outbound UDP ports 500 and 4500. Now I can 
connect directly without any trouble.

>I have tried to remove shorewall from the equation by doing the
>following with no luck.
>sudo shorewall clear
>sudo iptables -t nat -A POSTROUTING -o eth0 -s 192.168.118.0/24 -j 
>MASQUERADE

The above steps from your original post pretty much prove Shorewall 
can't be causing any problems, but you might want to try and use its 
logging facilities to help you track down if there is some other 
problem.

Just an idea
-Russel 


-------------------------------------------------------------------------
This SF.net email is sponsored by DB2 Express
Download DB2 Express C - the FREE version of DB2 express and take
control of your XML. No limits. Just data. Click to get it now.
http://sourceforge.net/powerbar/db2/
_______________________________________________
Shorewall-users mailing list
Shorewall-users@lists.sourceforge.net
https://lists.sourceforge.net/lists/listinfo/shorewall-users

Reply via email to